Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol

被引:13
|
作者
Hu, Xuexian [1 ,2 ]
Zhang, Zhenfeng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Zhengzhou, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Chaotic maps; Key exchange protocol; Anonymity; Man-in-the-middle attack;
D O I
10.1007/s11071-014-1515-x
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Recently, Lee et al. (Nonlinear Dyn, 73(1-2):125-132, 2013) proposed a three party password authenticated key exchange with user anonymity by utilizing extended chaotic maps. They claimed that their protocol is more secure than previously proposed schemes. In this paper, our analysis shows that Lee et al.'s protocol suffers from two kinds of attacks: (1) man-in-the-middle attack, and (2) user anonymity attack. To overcome these weakness, we propose an enhanced protocol that can resist the attacks described and yet with comparable efficiency.
引用
收藏
页码:1293 / 1300
页数:8
相关论文
共 50 条
  • [31] A communication-efficient three-party password authenticated key exchange protocol
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    INFORMATION SCIENCES, 2011, 181 (01) : 217 - 226
  • [32] Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (04) : 1329 - 1343
  • [33] Password-based authenticated key exchange in the three-party setting
    Abdalla, M.
    Fouque, P.-A.
    Pointcheval, D.
    IEE Proceedings: Information Security, 2006, 153 (01): : 27 - 39
  • [34] Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
    Dongna, E.
    Cheng, Qingfeng
    Ma, Chuangui
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 168 - 182
  • [35] Password-based authenticated key exchange in the three-party setting
    Abdalla, M
    Fouque, PA
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
  • [36] Re-attack on a three-party password-based authenticated key exchange protocol
    Liang, Haiquan
    Hu, Jingtai
    Wu, Shuhua
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (5-6) : 1175 - 1183
  • [37] Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    Nam, Junghyun
    Lee, Youngsook
    Kim, Seungjoo
    Won, Dongho
    INFORMATION SCIENCES, 2007, 177 (06) : 1364 - 1375
  • [38] Security Analysis and Improvements of Three-Party Password-Based Authenticated Key Exchange Protocol
    Wang, Qingping
    Ruan, Ou
    Wang, Zihao
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 497 - 508
  • [39] A Secure Three-party Authenticated Key Exchange Protocol Based on Extended Chaotic Maps in Cloud Storage Service
    Li, Chun-Ta
    Lee, Chin-Wen
    Shen, Jau-Ji
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 31 - 36
  • [40] Improved Verifier-based Three-party Password-authenticated Key Exchange Protocol
    Zhang, Qi-Hui
    Hu, Xue-Xian
    Liu, Wen-Fen
    Wei, Jiang-Hong
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (10): : 3238 - 3250